On Thu, Apr 10, 2008 at 10:15:07PM -0700, Kyle Hamilton wrote:

> Once this is done, the channel is 'secure' and user data can start
> flowing, without having to worry about anyone else being able to get
> anything intelligible from the conversation.

The channel is only secure against passive eavesdroppers, unless at least
one side verifies the keys of the other. The side that does not verify
the other's keys cannot be sure that the channel is secure, although it
might in fact be secure, because either party can detect a MITM attack
if it can verify the peer certificate.

The threat model (passive vs. active attacks, ...) determines the
right level of certificat verification. Mutual authentication (both
sides know which public keys/certs to accept, and check that they
get the right ones) offerst the best security, provided there is
good management of the trusted public keys...

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to